CompTIA A+ Practice Tests. Docter Quentin

Чтение книги онлайн.

Читать онлайн книгу CompTIA A+ Practice Tests - Docter Quentin страница 28

CompTIA A+ Practice Tests - Docter Quentin

Скачать книгу

print heads aligned so that they print evenly and don’t print funny-looking letters and unevenly spaced lines.

167

D. Desktop computers use dual inline memory modules (DIMMs), and laptops most commonly use small outline DIMMs (SODIMMs). Another potential laptop memory form factor is the MicroDIMM.

168

C. Thermal printers use a heating element. It heats up spots on special waxy, heat- sensitive paper to form the image.

169

A. When a laser printer requests maintenance, it’s because it has reached a certain page count. Apply a proper maintenance kit (one recommended by the manufacturer) and then clear the service message.

170

B. PCI-X slots are physically compatible with PCI adapters. Because all PCI-X slots support the 66MHz minimum clock rate, PCI-X slots are compatible with 66MHz PCI adapters.

171

C. There are dozens of peripherals on the computer market. Joysticks are used primarily to play video games. Barcode readers will scan item barcodes, such as items you purchase at a store. Motion sensors are usually associated with security systems. Smart TVs play television. Camcorders are another type of peripheral, used to record video.

172

B. Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.

173

B. An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.

174

A. Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they’ve been run as well.

175

C. Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.

176

A. The Domain Name System (DNS) server is responsible for resolving host names, such as www.google.com, to IP addresses to enable communication. If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website names.

177

C. Single-mode fiber (SMF) can provide data throughput rates of 10Gbps at a distance of 40 kilometers.

178

B. RG-59 network cable can run for about 228 meters (750 feet). The slightly thicker RG-6 can run for about 304 meters (1,000 feet).

179

B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. Because it’s secure, it was originally designed to be a replacement for the unsecure telnet command.

180

B, C. Switches and bridges work at Layer 2. Switches are multiport bridges.

181

B. Computers are able to differentiate where the network ID ends and the host address begins through the use of a subnet mask.

182

B. Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

183

D. Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally.

184

C. A CIDR shorthand notation of /26 corresponds to the subnet mask 255.255.255.192.

185

C. 802.11g specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range.

186

C. Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP only with a few more options, such as the ability to connect to printers, and more management commands.

187

C. Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally. Telnet uses port 23.

188

D. A wireless locator or a Wi-Fi analyzer can be either a handheld hardware device or specialized software that is installed on a laptop and whose purpose is to detect and analyze Wi-Fi signals. It can detect where signals are strong or weak to determine whether there are potential security issues.

189

C. Internet traffic is not encrypted by default. Websites that are secure and encrypt their transmissions will start with HTTPS://rather than HTTP://. These sites can be trusted to encrypt the data, and their identity is verified.

190

A. The main Internet layer protocol is Internet Protocol (IP), and it’s the workhorse of TCP/IP. Another key protocol at this layer is Internet Control Message Protocol (ICMP), which is responsible for delivering error messages. If you’re familiar with the ping utility, you’ll know that it utilizes ICMP to send and receive packets.

191

C. There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts.

192

A. Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.

193

B. A wide area network (WAN) covers large geographical areas and often supports thousands of users.

194

A. Developed by Microsoft, the Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. When you use RDP, you see the desktop of the computer you’ve signed into on your screen. It’s like you’re really there, even though you’re not.

195

B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. SSH uses port 22.

196

A. Private IP addresses are not routable on the Internet. The private IP address range for class A networks is 10.0.0.0/8.

197

D. One of the key features of routers is that they break up broadcast domains. Broadcast traffic on one side of the router will not get passed to the other side, which greatly reduces network traffic.

198

C. A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.

199

D. UTP cables are limited to 100 meters, so CAT5 and CAT7 will not work. You need fiber, and multimode fiber (MMF) can span distances of 300 meters.

200

C, D. Simple Mail Transfer Protocol (SMTP, port 25), Post Office Protocol 3 (POP3, port 110), and Internet Message Access Protocol (IMAP, port 143) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.

201

A. Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and

Скачать книгу